On Sat, 8 Jun 2013, Mouse wrote:
For internal
use on a private network, [ssh] protocol 1 is probably
fine, but for a machine with ssh open to the world, protocol 2 should
be enforced.
For internal use on a private network, why not just use rsh?
Because ssh protocol 1 still allows the use of a private key? Even on an
internal network I'd use ssh over something like telnet since ssh with a
private key is going to prevent a compromised host or device from brute
forcing access to other stuff.